Saturday, 23 February 2019

Mobile Query and Processing in Mobile Database Environment

MOBILE QUERY AND PROCESSING IN MOBILE DATABASE ENVIRONMENT Agustinus Borgy Waluyo1 1 Bala Srinivasan1 David Taniar2 School of Computer Science and Softwargon Engineering, Monash University, Australia Agustinus. Borgy. Waluyo, Bala. Srinivasaninfotech. monash. edu. au. 2 School of line of merchandise Systems, Monash University, Australia David. emailprotected monash. edu. au Abstract planetary entropybase is a bargon-assed consideration of infobase coat in radio parley environment. It introduces unique persona of queries, and examination-processing strategies that ar different to traditional databases.We classify rambling database dubiousness into two categories, especially setting- sensory faculty doubt and adhoc wonder. mise en scene-awareness interrogative is further classified into hole dependant, stage setting leech alike, and loanblend enquiry. As for the call into question processing, we define three strategies namely planetary guest, on lineage, and boniface placeline. unsettled c irascibilityt and on air strategy relates to caching strategy and permeate strategy respectively. Finally, we include whatsoever challenges in meandering(a) databases. 1. Introduction new-fashioned advances in radio engineering have led to erratic computing, a modernistic dimension in data communication and processing. Many predict a new emerging, gigantic market with millions of energetic exploiters carrying small, battery-powered terminal furnished with tuner connection 1,2,10. The erratic computing environment provides database occupations with useful aspects of wireless technology, which is known as diligent databases. This advance technology has created a new age of nomadic database drug drug users. Basically, these users are simply accessing a database through a vane.However, the network is now app resided in wireless environment, and has several refreshed properties, which include users situations are constantly changin g, the likelihood of losing connections is frequently greater than in a traditional network, and asymmetric communication environment in which the wireless bandwidth for uplink communication is smaller than downlink communication 11. In worldwide, supple user communicates with a fluid Base Station (MBS) to carry out any activities such as trans pull through and tellation recovery.MBS has a wireless interface to establish communication with bustling invitee and it serves a epic human activity of nomadic users in a specific region called cell. In mobile environment architecture, each MBS is connected to a indomitable network as illustrated in simulacrum 1(a). wide awake units or mobile customers in each cell foundation connect to the fixed network via wireless radio, wireless Local Area earnings (LAN), wireless cellular, or satellite. for each one of the wireless networks provides a different bandwidth capacity.However, the wireless bandwidth is too small as compare d to the fixed network such as ATM (Asynchronous Transfer Mode) usher out provide speed up to 155Mbps 7. 55 Wireless Network Mobile Base Station Mobile Base Station Wireless Network High speed Wired Network contumacious Host Fixed Host Crossing Crossing Mobile Client interrogative sentence interrogation Processing outline selective information Repository doubtfulness Result 2 Mobile Base Station Mobile Base Station doubtfulness Taxonomy = Mobile Client = Wireless Network 1 (a) Mobile surroundings Architecture (b) research Application in Mobile Environment telephone recite 1.Mobile Environment Architecture and Query Processing insert 1(b) depicts the head processing in mobile databases. Mobile client initiates a dubiousness, and hark back the data from data repository. The data repository is available in the fixed network. The query is transmitted through wireless transmission channel, and the reply is obtained using true query processing strategies. As put up be seen in construe 1b, a sign of number 1, and 2, which is attached in query taxonomy, and query processing strategy respectively, correspond to the chief(prenominal) content of this musical composition.Driven by differences between wired and wireless environment results in differences of showcase of queries, query processing mechanisms as well as communication technology. It is the aim of this paper to provide comprehensive query taxonomy, and processing strategy in mobile databases. Figure 2 shows a detailed structure of this paper. Subsequent partitions in this paper are organized as follows. Section 2 describes query taxonomy in mobile databases. Section 3 contains the query processing strategies, and section 4 discusses some challenges in mobile databases. Finally, section 5 concludes the paper.In this paper, the term mobile client, mobile device, mobile user, user and client are used inter departably Location D ependent Q ueries C ontext Aw areness Taxonomy C ontext D epen dent Q ueries hybridisation Q ueries A d Hoc Q ueries M obile Q uery and Processing M obile C lient Processing Strategy O n Air legion Figure 2. Structure of Paper 56 2. Query Taxonomy In this section, we classify suit of queries in mobile databases. The queries can be entirely new and specifically applied in the wireless environment, while the other can be a common type of query in traditional databases. 2. mount Awareness The word scope implies a variety of aspects. 14 defines the word scene into three categories namely computing context, user context, and physical context. Computing context relates to computing resources such as network connectivity, bandwidth, printer, and workstations. User context associates with users extremitys, preferences, roles, profile, and alike. Physical context involves environment issue, which include lighting, noise, traffic, temperature, and humidity. 5 adds another syndicate of context called cadence context, which refers to clipping of a day, week, month, year, etc. 6 defines context as either the aspect of physical world or mark off and activities in the virtual world. It is further described that context discipline can either be transient when the context associates with the environment at a presage of time or persistent when the context involves a annals of transient context. In simple words, we can al expressions define that context relates to who, when, where, and what. Context awareness creates a new class of diligences in mobile computing. With context awareness, mobile device is expected to adapt constantly in a wide range of dynamically and continually changing situations.It is grand for the device to be able to aware of the situation, environment, and tasks that the mobile client is playacting as well as bequeath be performing in the near future. The utilisation of context information in an application minimises the tally of user involvement in a service by providing tie in information. Having known the context of the query enables the device to pre-fetch all data that is highly related and likely to be queried in the near future. With this query, client alone when initiates a single require and all related data give be encounterd implicitly.This technique avoids client to have multiple request that result in energy efficiency. Example To find restaurants information in incumbent region. The query will result of retrieving restaurants based on users preferences such as Italian, Chinese or fast food as well as pre-fetching maps, traffic and weather condition, which is likely to be queried next. intimately applications have been focusing on mess awareness rather than context awareness as a whole. Thus, we classify mobile database queries into location hooked queries, context myrmecophilous queries, and the combination thereof. 2. 1. Location Dependent Queries Location dependent query is a class of queries that are motivated by mobile clients. In this type of quer y, the location of the mobile client is a statement of the query. The value of the location debate can be provided by the client or a global positioning governing body (GPS). An example of this query is a travelers information system that provides information on hotels, restaurant, bars and the like, to motorists. Processing of queries must be based on fellowship of the users location. For queries services that are ahead of the current route, rush of motion and speed are necessary to be taken into account.Recent technology provides a new feature in automobiles, which offers 57 navigational aids as a built-in feature. In general, each location updates generate two direct costs, particularly transmission cost, which refers to the cost to inform the innkeeper of the new location, and legion processing cost, which corresponds to the cost of updating the system containing the location of the mobile unit. The location argumentation can be in any objects, such as taxis, trucks, and helicopters. This class of query can be further classified into two categories (i) Continuous query, and (ii) On-demand query.Continuous query The persisting type of query includes substantial-time monitor lizarding of mobile objects. This is different compared with possessd queries, which are based on an instant of the database at some implication in time. Real-time monitoring queries are continuous for monitoring purposes 3, 13. Examples (i) To request information about nearby tourist attractions, hotels, or shopping content while traveling. With this type of query, users only need to vent a query once and notification of the updated information about nearby tourist attractions, hotels, or shopping center will be sent automatically as they move to different regions. ii) This query as well as helps tourists whenever they are close to a certain situation such as dangerous zone or traffic jam by providing some alerts to mobile user. Figure 3 shows an illustration of real-ti me query monitoring. In this application, the system must be able to provide the accurate query results and update them in real time whenever some mobile clients enters or exits the region defined by the query. This class of query can be referred as range-monitoring queries. The range-monitoring queries are removed from the system only when the user explicitly ends the query. waiter End Query Query i Response i New function Updated answer i Region 1 Mobile Client 1 Moves to Region 2 Mobile Client 1 Figure 3. Continuous Query On demand query The on demand location dependent query is different from continuous query in a way that its database counsel does not manage the query but only the location of each mobile units in specified regions. Figure 4 illustrates on demand query. E actually mobile unit is registered under one location server that manages the user profiles and is called the abode location server.Location information of mobile clients can be injectd at predefined sit es like the users home location server in a network. Consequently, the search space for a users location can be reduced. However, when a mobile user crosses any boundaries of a cell, the information at the predefined site has to be updated accordingly. This type of query does not have to specify when to end the query since the server does not keep the query but the location 12. Examples To resume nearby hospital, police station or petrol station in the area. 58 Server Q uery i R esponse i Q uery j R esponse j Region 1 M obile C lien t 1M oves to Region 2 M obile C lien t 1 Figure 4. On Demand Query When the parameter is an object, and mobile client requests an object that satisfies location criteria, then the situation becomes different. Figure 5 illustrates on demand query with location object parameter 8,15. Examples (i) Taxi operator wants to see how many free taxis are shortly in a certain region. They can find free taxis and share them to another region that require to a grea ter extent taxis or address them forthwith to the nearby customer. (ii) Tourists who come to the country, where there are no designated bus stops, nor timetable.They can utilize mobile device to retrieve incoming buses within a pre-defined time. Server Object Query Object Result Location bring in Location Info Mobile Client Object Figure 5. On Demand Query with Location Object Parameter 2. 1. 2 Context Dependent Queries This type of query requires maintenance of an internal representation of users inescapably, preferences, roles, profile, etc. With these parameters, application will be able to limit the situation and task that a user is currently performing, and adapt to change of user needs and roles.This enables mobile device not to just retrieve the required information but in addition some other information that is highly pertinent 6,8. Examples (i) Tourist wants to see list of restaurants in a town. Rather than retrieving the entire list of restaurants, the query retriev es the restaurants based on users preferences and need such as cuisine preference, price, occasion, etc. (ii) A business person wants to check the closest meeting schedule. The query retrieves the time as well as previous history of the meeting, people involved, client accounts, meal preferences, required data, etc. 9 2. 1. 3 Hybrid Queries Hybrid queries represent a combination of location dependent and context dependent queries. This type of query requires the system to maintain all parameters of context-awareness queries including location parameter. Examples (i) A Traveler wants to find restaurants in the region that he/she will revere and within 10 minutes of current travel distance, (ii) A adolescent wants to check movies in the nearby cinemas that he/she will like, and the show time can be met while considering current travel distance.These queries are very useful for nomadic users since it not only considers the users preferences and needs but in any case the location of t he user. More sophisticated application utilizes a variety of sensors to monitor the environment as well as users action in order to provide assistance of the tasks being performed by the user. This application requires the ability to process data streams in real-time, crumple and interpret it precisely. The main point in context awareness query is to accurately analyze the environment and users intention, regardless of where the context information is obtained from.It is a difficult challenge since there is a possibility of conflicting data, and the need to have efficient processing to provide a useful application to the user. 2. 2 Ad Hoc Queries Ad Hoc queries are commonly utilised queries in traditional DBMS. This type of query explicitly mentions the required information in the query statement, and does not involve any context awareness information. Thus, the query result is only based on the actual query itself. Examples (i) University pupil wants to retrieve his/her academic record or personal details. ii) Travelling sales person inquires about product availability, price, etc. 3. Query Processing Strategy We divide query-processing strategy for mobile databases into three parts, namely (i) mobile/client strategy, (ii) on-air strategy and, (iii) server strategy. Mobile/clients strategy relates to how client manipulates and maintains the data in its cache efficiently and effectively. On-air strategy corresponds to data circularizeing strategies. With this strategy, the number of mobile users does not affect the query surgery.Server strategy relates to designing techniques for the server to accommodate multiple requests so that the request can be graceful as efficiently as possible. We claim that query processing for mobile databases is very much centered around the issues of caching, transporting, and plan. Figure 6 shows the architecture of query processing in mobile databases. 60 C Strategies lient OA n ir Strategies Server Strategies Figure 6. Query Processing in Mobile databases 3. 1 Mobile Client Strategy Mobile clients strategy defines a number of strategies to maintain cached data contingents in clients topical anesthetic storage.As stated earlier, wireless communication channel in general suffers to narrow bandwidth while it is in like manner inherently asymmetric communication, in which the downstream communication bandwidth from a server to the mobile client is much big than the upstream communication bandwidth from clients back to server. Due to the above evidence, caching of frequently accessed data items in a clients topical anesthetic storage becomes of the essence(predicate) for enhancing the performance and data availability of data access queries. Another receipts of caching is the ability to handle fault tolerance.This is related to the characteristics of mobile computing in which each mobile client connects or disconnects from the network frequently. In some situation, the MBS may not be accessible due to problem like signal distortion. However, a query can still be partially affect from caches and at least some of the query results can be returned to the user 9. Three main issues characterize a caching mechanism. These issues include caching granularity, caching viscidity strategy, and caching replacement policy.Caching granularity relates to determining a physical form of cached data items. Caching coherence strategy or revocation strategy involves cache invalidation and update schemes to invalidate and update an out-dated cached item 4. Caching replacement policy is necessitate to retain the frequently accessed database items in a clients local storage. The more effective a caching replacement policy in memory the frequently accessed items, the better a query will perform and the more queries could be served during disconnection situation. 3. On Air Strategy In this scheme, the server periodically broadcasts the frequently accessed data items to clients through one or more broadcast channels, but the clients may not cache the data item of interest. This situation might occur when the client does not have affluent memory or space to cache the required data. The behavior of this channel is unidirectional which means the server disseminates a set of data periodically, via this type of channel to a multiple number of users. A complete broadcast file is referred as a broadcast cycle.In this scheme, the client needs to listen to channel and filter the required data over the channel, which is also generally known as push-mechanism. Figure 7 shows on air query processing. 61 The advantage of broadcasting channel is its scalability. The number of users in the cell and the request rate do not affect the performance of the server. Thus, the utilization of bandwidth is better and the server workload is lower as compared with point to point/on-demand communication. Consequently, the power utilization of the client to retrieve information is also improved.Ho wever, it is very important to have good strategies to maintain the overall chemical reaction time of the client to obtain information from the channel or else the advantages of data broadcast will be diminished. B ro ad cast C h an n el = listen in g to th e chan n el = retriev in g th e d esired data M o bile C lie nt Figure 7. On Air Query Processing 3. 3 Server Strategy This strategy considers the problem of pull-based broadcast programing where mobile clients send queries to the server through dedicated or point-to-point channel, server process the query, and send the result back to the client.The strategy concerns with broadcast and disk scheduling. Broadcast scheduling is to determine how queries to be served efficiently in the server considering a number of factors such as the length of the query, the wait time and the popularity of the items. Data scheduling is related to how data is placed on the disk that improves the query response time. The possibility of combining th ese two methods for query processing strategy is an raise issue to be explored. B road cast server C ach e S erver D isk S erver T r a n sm itte r S erver Figure 8. Broadcast Server ArchitectureA database server is able to enhance the data retrieval performance by incorporating its own main memory and cache to store those database items frequently accessed by around mobile clients. Figure 62 8 shows architecture of broadcast server. A query can be processed either in the disk server or cache server. If the relevant data items have been retrieved earlier then the query is processed in the cache server. After processing a query, the results are transmitted to the sender queue, which subsequently send the data items through the wireless channel. 4. Challenges in Mobile DatabasesThis section discusses some challenges in mobile database environment. The general concept that has been sketch in this paper contains an enormous issue to investigate. However, due to the limitation of page, only a few numbers can be mentioned. Location wariness is an important issue in mobile database interrogation. Since the number of user nation carrying mobile devices increases linearly with the service demand, the communication traffic for locating users also increases accordingly. This situation requires an efficient strategy for location tracking and management.Location management is a very essential factor in providing context awareness services. Context security introduces a new issue to be considered. Since context information may contain a very confidential and secret data. It is necessary to ensure privacy issue protection for every user in a network. Caching management strategy, which includes caching granularity, caching coherent issue, and caching replacement strategy, requires a consummate(a) investigation. A good caching management strategy is able to analyse, predict, and adapt to changing of users context in order to assist user in performing tasks.As for proces sing issue, data caching in mobile databases enable clients to obtain a high computing speed as server, by involving a much smaller data items volume. The asymmetric communication in mobile environment has made it a better reason to employ caching strategy. Broadcast scheduling is another issue to investigate. Generally, the more number of data to be broadcast, the more requests will be served from the data broadcast and this will reduce the chance of mobile clients to send the request to the server. However, at a certain point the advantage of the broadcast data will be diminished if there is too many data in the roadcast cycle. Consequently, it will severely affect the query response time since mobile users have to wait for considerably long delay before they receive the desired data. Therefore, it is essential to decide what data to be broadcast that serves most of the requests since the query access pattern is changed dynamically. 5. Conclusions Recent emergence of wireless tech nology enables people to conduct activities, business, or transactions anywhere and anytime without any supplement to stationary computer like used to be.Nomadic people are now able to access email, news, weather, and query to the central database server using wireless devices. Mobile database focuses on the query issue that is the dominant function in mobile computing. Since mobile database is a new dimension of database application, the type of query, query processing strategy, and communication technology that involves in the application are different than what applies in traditional databases. We have defined query taxonomy as well as query processing strategy in mobile databases.Query in mobile databases are categorized into context-awareness query and ad-hoc query. Context- 63 awareness query is further classified into location dependent, context dependent, and hybrid query. Query processing in mobile databases includes mobile client, on air, and server strategy. Mobile clie nt and on air strategy corresponds to caching strategy and broadcast strategy respectively. Finally, we discuss a few challenges that open enormous opportunities for research in mobile databases. 6. References 1. 2. 3. 4. 5. 6. 7. 8. 9. ACHARYA S. , ALONSO R. , FRANKLIN M. AND ZDONIK S. Broadcast Disks Data counselling for Asymmetric conference Environments, Proceedings of ACM Sigmod, pp. 199-210, May, 1995. BARBARA D. , Mobile Computing and Databases-A cogitation, IEEE TKDE, 11(1)108-117, January/February, 1999. CAI Y. AND HUA K. A. , An Adaptive Query Management Technique for Real-Time Monitoring of Spatial Regions in Mobile Database Systems, twenty-first IEEE IPCCC, pp. 259-266, 2002. CHAN B. Y. , SI A. and Leong H. V. , Cache Management for Mobile Databases Design and Evaluation, Proceedings of the world-wide Conference on Data Engineering (ICDE), pp. 4-63, 1998. CHEN G. AND KOTZ D. , A Survey of Context-Aware Mobile Computing Research, Technical Report TR2000381, Department of Computer Science, Dartmouth College, November, 2000. EBLING R. M. , persist H. D. G. AND LEI H. , Issues for Context Services for Pervasive Computing, Proceedings of Middleware01 Advanced shop on Middleware for Mobile Computing, Heidelberg, November, 2001. ELMASRI R. AND NAVATHE S. B. , Fundamentals of Database Systems, 3rd Edition, Addison W. , U. S. A. , 2000. FRANKLIN J. M. , Challenges in Ubiquitous Data Management, Informatics, pp. 4-33, 2001. GODFREY P. AND GRYZ J. , Semantic Query Caching for Heterogeneous Databases, Proceedings of the 4th Knowledge internal representation meets Databases Workshop (KRDB), pp. 61-66, April, 1997. 10. IMIELINSKI T. AND VISWANATHAN S. , Adaptive Wireless Information Systems, Proceedings of SIGDBS (Special Interest conclave in Database Systems) Conference, pp. 19-41, October, 1994. 11. IMIELINSKI T. , VISWANATHAN S. AND BADRINATH B. R. , Data on Air Organisation and Access, IEEE TKDE, 19(3) 353-371, May/June, 1997. 12. KOTTKAMP H. -E. AND Z UKUNFT O. Location-Aware Query Processing in Mobile Database Systems, ACM Symposium on Applied Computing, pp. 416-423, February, 1998. 13. KUBACH U. AND ROTHERMEL K. , A Map-Based stash Mechanism for Location-Dependent Information, Proceedings of Second Mobile Data Management (MDM), pp. 145-157, January, 2001. 14. SCHILIT B. , ADAMS N. AND expect R. , Context-Aware Computing Applications, Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 85-90, December, 1994. 15. WOLFSON O. , ET AL, Databases for trailing Mobile Units in Real Time, Proceedings of ICDT99, pp. 169186, 1998. 64

No comments:

Post a Comment